Information security
fromTechzine Global
4 days agoSkeleton Key campaign exploits trusted RMM tools
Attackers hijack legitimate remote monitoring and management (RMM) tools, using stolen credentials and signed enterprise software to maintain stealthy persistent backdoors.